Event Description

Data Access Governance Best Practices - Part 1 of 2

Data Access Management

Best Practices for Data Access Management:

  • Create a complete inventory of your users and resources and keep it up to date.
  • Work with department managers and other business owners to determine where your sensitive data is and who owns it.
  • Determine who has access to what and who owns what data in your organization. For example, you can export access lists of your file servers using PowerShell scripts or third-party software.
  • Establish a security structure by creating security groups and making users members of the appropriate groups.
  • Assign each group appropriate access to shared data.
  • Empower data owners to control access rights to the data they own.
  • Audit the actions of data owners to be sure that all operations are authorized.
  • Establish an access request workflow (such as a request portal) so users can easily request access to data they need to do their jobs.
  • Audit and report on access to sensitive data as well as changes to it.
  • Make all sensitive shares hidden by adding a dollar sign ($) to the end of each share name.
  • Run an access certification program to align access with business needs.

 

Print
Tags: